Vulnerabilities > CVE-2019-5754 - Use of a Broken or Risky Cryptographic Algorithm vulnerability in multiple products

047910
CVSS 6.5 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
NONE
Availability impact
NONE
network
low complexity
google
redhat
fedoraproject
debian
CWE-327
nessus

Summary

Implementation error in QUIC Networking in Google Chrome prior to 72.0.3626.81 allowed an attacker running or able to cause use of a proxy server to obtain cleartext of transport encryption via malicious network proxy.

Vulnerable Configurations

Part Description Count
Application
Google
4531
OS
Redhat
3
OS
Fedoraproject
2
OS
Debian
1

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Encryption Brute Forcing
    An attacker, armed with the cipher text and the encryption algorithm used, performs an exhaustive (brute force) search on the key space to determine the key that decrypts the cipher text to obtain the plaintext.
  • Creating a Rogue Certificate Authority Certificate
    An attacker exploits a weakness in the MD5 hash algorithm (weak collision resistance) to generate a certificate signing request (CSR) that contains collision blocks in the "to be signed" part. The attacker specially crafts two different, but valid X.509 certificates that when hashed with the MD5 algorithm would yield the same value. The attacker then sends the CSR for one of the certificates to the Certification Authority which uses the MD5 hashing algorithm. That request is completely valid and the Certificate Authority issues an X.509 certificate to the attacker which is signed with its private key. An attacker then takes that signed blob and inserts it into another X.509 certificate that the attacker generated. Due to the MD5 collision, both certificates, though different, hash to the same value and so the signed blob works just as well in the second certificate. The net effect is that the attackers' second X.509 certificate, which the Certification Authority has never seen, is now signed and validated by that Certification Authority. To make the attack more interesting, the second certificate could be not just a regular certificate, but rather itself a signing certificate. Thus the attacker is able to start their own Certification Authority that is anchored in its root of trust in the legitimate Certification Authority that has signed the attackers' first X.509 certificate. If the original Certificate Authority was accepted by default by browsers, so will now the Certificate Authority set up by the attacker and of course any certificates that it signs. So the attacker is now able to generate any SSL certificates to impersonate any web server, and the user's browser will not issue any warning to the victim. This can be used to compromise HTTPS communications and other types of systems where PKI and X.509 certificates may be used (e.g., VPN, IPSec) .
  • Signature Spoof
    An attacker generates a message or datablock that causes the recipient to believe that the message or datablock was generated and cryptographically signed by an authoritative or reputable source, misleading a victim or victim operating system into performing malicious actions.
  • Cryptanalysis
    Cryptanalysis is a process of finding weaknesses in cryptographic algorithms and using these weaknesses to decipher the ciphertext without knowing the secret key (instance deduction). Sometimes the weakness is not in the cryptographic algorithm itself, but rather in how it is applied that makes cryptanalysis successful. An attacker may have other goals as well, such as: 1. Total Break - Finding the secret key 2. Global Deduction - Finding a functionally equivalent algorithm for encryption and decryption that does not require knowledge of the secret key. 3. Information Deduction - Gaining some information about plaintexts or ciphertexts that was not previously known 4. Distinguishing Algorithm - The attacker has the ability to distinguish the output of the encryption (ciphertext) from a random permutation of bits The goal of the attacker performing cryptanalysis will depend on the specific needs of the attacker in a given attack context. In most cases, if cryptanalysis is successful at all, an attacker will not be able to go past being able to deduce some information about the plaintext (goal 3). However, that may be sufficient for an attacker, depending on the context.

Nessus

  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-0309.NASL
    descriptionAn update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Chromium is an open source web browser, powered by WebKit (Blink). This update upgrades Chromium to version 72.0.3626.81. Security Fix(es) : * chromium-browser: Inappropriate implementation in QUIC Networking (CVE-2019-5754) * chromium-browser: Inappropriate implementation in V8 (CVE-2019-5755) * chromium-browser: Use after free in PDFium (CVE-2019-5756) * chromium-browser: Type Confusion in SVG (CVE-2019-5757) * chromium-browser: Use after free in Blink (CVE-2019-5758) * chromium-browser: Use after free in HTML select elements (CVE-2019-5759) * chromium-browser: Use after free in WebRTC (CVE-2019-5760) * chromium-browser: Use after free in SwiftShader (CVE-2019-5761) * chromium-browser: Use after free in PDFium (CVE-2019-5762) * chromium-browser: Insufficient validation of untrusted input in V8 (CVE-2019-5763) * chromium-browser: Use after free in WebRTC (CVE-2019-5764) * chromium-browser: Insufficient policy enforcement in the browser (CVE-2019-5765) * chromium-browser: Inappropriate implementation in V8 (CVE-2019-5782) * chromium-browser: Insufficient policy enforcement in Canvas (CVE-2019-5766) * chromium-browser: Incorrect security UI in WebAPKs (CVE-2019-5767) * chromium-browser: Insufficient policy enforcement in DevTools (CVE-2019-5768) * chromium-browser: Insufficient validation of untrusted input in Blink (CVE-2019-5769) * chromium-browser: Heap buffer overflow in WebGL (CVE-2019-5770) * chromium-browser: Heap buffer overflow in SwiftShader (CVE-2019-5771) * chromium-browser: Use after free in PDFium (CVE-2019-5772) * chromium-browser: Insufficient data validation in IndexedDB (CVE-2019-5773) * chromium-browser: Insufficient validation of untrusted input in SafeBrowsing (CVE-2019-5774) * chromium-browser: Insufficient policy enforcement in Omnibox (CVE-2019-5775) * chromium-browser: Insufficient policy enforcement in Omnibox (CVE-2019-5776) * chromium-browser: Insufficient policy enforcement in Omnibox (CVE-2019-5777) * chromium-browser: Insufficient policy enforcement in Extensions (CVE-2019-5778) * chromium-browser: Insufficient policy enforcement in ServiceWorker (CVE-2019-5779) * chromium-browser: Insufficient policy enforcement (CVE-2019-5780) * chromium-browser: Insufficient policy enforcement in Omnibox (CVE-2019-5781) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    last seen2020-05-31
    modified2019-02-12
    plugin id122112
    published2019-02-12
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/122112
    titleRHEL 6 : chromium-browser (RHSA-2019:0309)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-4395.NASL
    descriptionSeveral vulnerabilities have been discovered in the chromium web browser. - CVE-2018-17481 A use-after-free issue was discovered in the pdfium library. - CVE-2019-5754 Klzgrad discovered an error in the QUIC networking implementation. - CVE-2019-5755 Jay Bosamiya discovered an implementation error in the v8 JavaScript library. - CVE-2019-5756 A use-after-free issue was discovered in the pdfium library. - CVE-2019-5757 Alexandru Pitis discovered a type confusion error in the SVG image format implementation. - CVE-2019-5758 Zhe Jin discovered a use-after-free issue in blink/webkit. - CVE-2019-5759 Almog Benin discovered a use-after-free issue when handling HTML pages containing select elements. - CVE-2019-5760 Zhe Jin discovered a use-after-free issue in the WebRTC implementation. - CVE-2019-5762 A use-after-free issue was discovered in the pdfium library. - CVE-2019-5763 Guang Gon discovered an input validation error in the v8 JavaScript library. - CVE-2019-5764 Eyal Itkin discovered a use-after-free issue in the WebRTC implementation. - CVE-2019-5765 Sergey Toshin discovered a policy enforcement error. - CVE-2019-5766 David Erceg discovered a policy enforcement error. - CVE-2019-5767 Haoran Lu, Yifan Zhang, Luyi Xing, and Xiaojing Liao reported an error in the WebAPKs user interface. - CVE-2019-5768 Rob Wu discovered a policy enforcement error in the developer tools. - CVE-2019-5769 Guy Eshel discovered an input validation error in blink/webkit. - CVE-2019-5770 hemidallt discovered a buffer overflow issue in the WebGL implementation. - CVE-2019-5772 Zhen Zhou discovered a use-after-free issue in the pdfium library. - CVE-2019-5773 Yongke Wong discovered an input validation error in the IndexDB implementation. - CVE-2019-5774 Junghwan Kang and Juno Im discovered an input validation error in the SafeBrowsing implementation. - CVE-2019-5775 evil1m0 discovered a policy enforcement error. - CVE-2019-5776 Lnyas Zhang discovered a policy enforcement error. - CVE-2019-5777 Khalil Zhani discovered a policy enforcement error. - CVE-2019-5778 David Erceg discovered a policy enforcement error in the Extensions implementation. - CVE-2019-5779 David Erceg discovered a policy enforcement error in the ServiceWorker implementation. - CVE-2019-5780 Andreas Hegenberg discovered a policy enforcement error. - CVE-2019-5781 evil1m0 discovered a policy enforcement error. - CVE-2019-5782 Qixun Zhao discovered an implementation error in the v8 JavaScript library. - CVE-2019-5783 Shintaro Kobori discovered an input validation error in the developer tools. - CVE-2019-5784 Lucas Pinheiro discovered an implementation error in the v8 JavaScript library.
    last seen2020-06-01
    modified2020-06-02
    plugin id122272
    published2019-02-19
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/122272
    titleDebian DSA-4395-1 : chromium - security update
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-205.NASL
    descriptionThis update for Chromium to version 72.0.3626.96 fixes the following issues : Security issues fixed (bsc#1123641 and bsc#1124936) : - CVE-2019-5784: Inappropriate implementation in V8 - CVE-2019-5754: Inappropriate implementation in QUIC Networking. - CVE-2019-5782: Inappropriate implementation in V8. - CVE-2019-5755: Inappropriate implementation in V8. - CVE-2019-5756: Use after free in PDFium. - CVE-2019-5757: Type Confusion in SVG. - CVE-2019-5758: Use after free in Blink. - CVE-2019-5759: Use after free in HTML select elements. - CVE-2019-5760: Use after free in WebRTC. - CVE-2019-5761: Use after free in SwiftShader. - CVE-2019-5762: Use after free in PDFium. - CVE-2019-5763: Insufficient validation of untrusted input in V8. - CVE-2019-5764: Use after free in WebRTC. - CVE-2019-5765: Insufficient policy enforcement in the browser. - CVE-2019-5766: Insufficient policy enforcement in Canvas. - CVE-2019-5767: Incorrect security UI in WebAPKs. - CVE-2019-5768: Insufficient policy enforcement in DevTools. - CVE-2019-5769: Insufficient validation of untrusted input in Blink. - CVE-2019-5770: Heap buffer overflow in WebGL. - CVE-2019-5771: Heap buffer overflow in SwiftShader. - CVE-2019-5772: Use after free in PDFium. - CVE-2019-5773: Insufficient data validation in IndexedDB. - CVE-2019-5774: Insufficient validation of untrusted input in SafeBrowsing. - CVE-2019-5775: Insufficient policy enforcement in Omnibox. - CVE-2019-5776: Insufficient policy enforcement in Omnibox. - CVE-2019-5777: Insufficient policy enforcement in Omnibox. - CVE-2019-5778: Insufficient policy enforcement in Extensions. - CVE-2019-5779: Insufficient policy enforcement in ServiceWorker. - CVE-2019-5780: Insufficient policy enforcement. - CVE-2019-5781: Insufficient policy enforcement in Omnibox. For a full list of changes refer to https://chromereleases.googleblog.com/2019/02/stable-channel-update-fo r-desktop.html
    last seen2020-06-01
    modified2020-06-02
    plugin id122305
    published2019-02-19
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/122305
    titleopenSUSE Security Update : chromium (openSUSE-2019-205)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-204.NASL
    descriptionThis update for Chromium to version 72.0.3626.96 fixes the following issues : Security issues fixed (bsc#1123641 and bsc#1124936) : - CVE-2019-5784: Inappropriate implementation in V8 - CVE-2019-5754: Inappropriate implementation in QUIC Networking. - CVE-2019-5782: Inappropriate implementation in V8. - CVE-2019-5755: Inappropriate implementation in V8. - CVE-2019-5756: Use after free in PDFium. - CVE-2019-5757: Type Confusion in SVG. - CVE-2019-5758: Use after free in Blink. - CVE-2019-5759: Use after free in HTML select elements. - CVE-2019-5760: Use after free in WebRTC. - CVE-2019-5761: Use after free in SwiftShader. - CVE-2019-5762: Use after free in PDFium. - CVE-2019-5763: Insufficient validation of untrusted input in V8. - CVE-2019-5764: Use after free in WebRTC. - CVE-2019-5765: Insufficient policy enforcement in the browser. - CVE-2019-5766: Insufficient policy enforcement in Canvas. - CVE-2019-5767: Incorrect security UI in WebAPKs. - CVE-2019-5768: Insufficient policy enforcement in DevTools. - CVE-2019-5769: Insufficient validation of untrusted input in Blink. - CVE-2019-5770: Heap buffer overflow in WebGL. - CVE-2019-5771: Heap buffer overflow in SwiftShader. - CVE-2019-5772: Use after free in PDFium. - CVE-2019-5773: Insufficient data validation in IndexedDB. - CVE-2019-5774: Insufficient validation of untrusted input in SafeBrowsing. - CVE-2019-5775: Insufficient policy enforcement in Omnibox. - CVE-2019-5776: Insufficient policy enforcement in Omnibox. - CVE-2019-5777: Insufficient policy enforcement in Omnibox. - CVE-2019-5778: Insufficient policy enforcement in Extensions. - CVE-2019-5779: Insufficient policy enforcement in ServiceWorker. - CVE-2019-5780: Insufficient policy enforcement. - CVE-2019-5781: Insufficient policy enforcement in Omnibox. For a full list of changes refer to https://chromereleases.googleblog.com/2019/02/stable-channel-update-fo r-desktop.html
    last seen2020-05-31
    modified2019-02-19
    plugin id122304
    published2019-02-19
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/122304
    titleopenSUSE Security Update : chromium (openSUSE-2019-204)
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_GOOGLE_CHROME_72_0_3626_81.NASL
    descriptionThe version of Google Chrome installed on the remote macOS host is prior to 72.0.3626.81. It is, therefore, affected by multiple vulnerabilities as noted in Google Chrome stable channel update release notes for 2019/01/29. Please refer to the release notes for additional information. Note that Nessus has not attempted to exploit these issues but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id121513
    published2019-01-31
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/121513
    titleGoogle Chrome < 72.0.3626.81 Multiple Vulnerabilities
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2019-561EAE4626.NASL
    descriptionUpdate to 73.0.3683.75. Fixes large bucket of CVEs. CVE-2019-5754 CVE-2019-5782 CVE-2019-5755 CVE-2019-5756 CVE-2019-5757 CVE-2019-5758 CVE-2019-5759 CVE-2019-5760 CVE-2019-5761 CVE-2019-5762 CVE-2019-5763 CVE-2019-5764 CVE-2019-5765 CVE-2019-5766 CVE-2019-5767 CVE-2019-5768 CVE-2019-5769 CVE-2019-5770 CVE-2019-5771 CVE-2019-5772 CVE-2019-5773 CVE-2019-5774 CVE-2019-5775 CVE-2019-5776 CVE-2019-5777 CVE-2019-5778 CVE-2019-5779 CVE-2019-5780 CVE-2019-5781 CVE-2019-5784 CVE-2019-5786 CVE-2019-5787 CVE-2019-5788 CVE-2019-5789 CVE-2019-5790 CVE-2019-5791 CVE-2019-5792 CVE-2019-5793 CVE-2019-5794 CVE-2019-5795 CVE-2019-5796 CVE-2019-5797 CVE-2019-5798 CVE-2019-5799 CVE-2019-5800 CVE-2019-5802 CVE-2019-5803 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id123100
    published2019-03-26
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/123100
    titleFedora 29 : chromium (2019-561eae4626)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2019-05A780936D.NASL
    descriptionUpdate to 73.0.3683.75. Fixes large bucket of CVEs. CVE-2019-5754 CVE-2019-5782 CVE-2019-5755 CVE-2019-5756 CVE-2019-5757 CVE-2019-5758 CVE-2019-5759 CVE-2019-5760 CVE-2019-5761 CVE-2019-5762 CVE-2019-5763 CVE-2019-5764 CVE-2019-5765 CVE-2019-5766 CVE-2019-5767 CVE-2019-5768 CVE-2019-5769 CVE-2019-5770 CVE-2019-5771 CVE-2019-5772 CVE-2019-5773 CVE-2019-5774 CVE-2019-5775 CVE-2019-5776 CVE-2019-5777 CVE-2019-5778 CVE-2019-5779 CVE-2019-5780 CVE-2019-5781 CVE-2019-5784 CVE-2019-5786 CVE-2019-5787 CVE-2019-5788 CVE-2019-5789 CVE-2019-5790 CVE-2019-5791 CVE-2019-5792 CVE-2019-5793 CVE-2019-5794 CVE-2019-5795 CVE-2019-5796 CVE-2019-5797 CVE-2019-5798 CVE-2019-5799 CVE-2019-5800 CVE-2019-5802 CVE-2019-5803 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-31
    modified2019-05-02
    plugin id124466
    published2019-05-02
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/124466
    titleFedora 30 : chromium (2019-05a780936d)
  • NASL familyWindows
    NASL idGOOGLE_CHROME_72_0_3626_81.NASL
    descriptionThe version of Google Chrome installed on the remote Windows host is prior to 72.0.3626.81. It is, therefore, affected by multiple vulnerabilities as noted in Google Chrome stable channel update release notes for 2019/01/29. Please refer to the release notes for additional information. Note that Nessus has not attempted to exploit these issues but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id121514
    published2019-01-31
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/121514
    titleGoogle Chrome < 72.0.3626.81 Multiple Vulnerabilities

Redhat

advisories
rhsa
idRHSA-2019:0309
rpms
  • chromium-browser-0:72.0.3626.81-1.el6_10
  • chromium-browser-debuginfo-0:72.0.3626.81-1.el6_10